US6553358B1 - Decision-theoretic approach to harnessing text classification for guiding automated action - Google Patents

Decision-theoretic approach to harnessing text classification for guiding automated action Download PDF

Info

Publication number
US6553358B1
US6553358B1 US09/295,088 US29508899A US6553358B1 US 6553358 B1 US6553358 B1 US 6553358B1 US 29508899 A US29508899 A US 29508899A US 6553358 B1 US6553358 B1 US 6553358B1
Authority
US
United States
Prior art keywords
action
probability
text
user
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US09/295,088
Inventor
Eric Horvitz
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to US09/295,088 priority Critical patent/US6553358B1/en
Assigned to MICROSOFT CORP. reassignment MICROSOFT CORP. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HORVITZ, ERIC
Application granted granted Critical
Publication of US6553358B1 publication Critical patent/US6553358B1/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems

Definitions

  • This invention relates generally to decision theory, and its application to automated decision making when used in conjunction with automated classification systems such as text classification systems, and more particularly to utilizing decision theory for guiding automated user interface, communication, and system actions.
  • Messaging programs generally allow a user to send and receive electronic mail (e.g., messages) to and from other computer users, for example, over a local- or a wide-area network, or over an intranet, extranet, or the Internet.
  • Online schedule and calendar programs generally allow a user to create and to track appointments in a calendar. More sophisticated scheduling programs allow one user to schedule a group meeting with other computer users—checking the latter users' schedule availability, and receiving confirmation from the users upon them accepting or rejecting the group meeting appointment.
  • messaging and scheduling programs are generally not very well integrated, even if they are components within the same computer program. For example, a user may receive a message from a colleague stating “Looking forward to seeing you at 2 on Thursday.” Generally, however, the prior art does not provide for automatically directing the scheduling program to make a meeting appointment at 2 p.m. on Thursday. Instead, typically the user who has received the message has to open the scheduling program, access Thursday's calendar, and manually enter an appointment at 2 p.m. on Thursday's calendar. Because of the many steps required to go from reading the message within the messaging program to entering the information into the scheduling program, many users choose not to even use scheduling programs, or to only use them sparingly.
  • a computer-implemented method first determines a text to analyze. The method then determines an action probability based on the text and/or contextual information (e.g., information regarding recent user activity, organizational information, etc.), and based on the action probability, selects one of the following options: (1) inaction, (2) automatic action, or (3) suggested action with user approval. Upon the method selecting either the (1) automatic action option or the (2) suggested action with user approval option—the latter also in conjunction with receiving actual user approval—the method performs an action based on the text.
  • contextual information e.g., information regarding recent user activity, organizational information, etc.
  • Embodiments of the invention provide for advantages not found within the prior art. For example, in the context of scheduling appointments based on the text input, the method can perform an action based on the text, upon determining the action probability of the text. Based on the action probability the method determines if it should do nothing (i.e., corresponding to a low probability), do something automatically (i.e., corresponding to a high probability), or suggest an action, but do not do it automatically (i.e., corresponding to a medium probability). Thus, one embodiment of the invention effectively links scheduling with messaging automatically.
  • the invention itself is not limited to the application of scheduling and messaging, however; for example, other actions that can be based on the text analyzed including extracting contact information and storing the information in an address book, forwarding, paging, routing and moving, as those of ordinary skill within the art can appreciate.
  • the invention includes computer-implemented methods, machine-readable media, computerized systems, and computers of varying scopes.
  • Other aspects, embodiments and advantages of the invention, beyond those described here, will become apparent by reading the detailed description and with reference to the drawings.
  • FIG. 1 is a diagram of an operating environment in conjunction with which embodiments of the invention can be practiced;
  • FIG. 2 is a diagram of an example of directed scheduling, according to an embodiment of the invention.
  • FIG. 3 is a flowchart of a method according to an embodiment of the invention.
  • FIG. 4 is a flowchart of a method to construct a model utilized to determine an action probability of a text, according to an embodiment of the invention
  • FIG. 5 is a graph in accordance with an application of decision theory that can be utilized in conjunction with embodiments of the invention.
  • FIG. 6 is another graph in accordance with an application of decision theory that can be utilized in conjunction with embodiments of the invention.
  • FIG. 7 is a diagram of a system according to an embodiment of the invention.
  • FIG. 1 a diagram of the hardware and operating environment in conjunction with which embodiments of the invention may be practiced is shown.
  • the description of FIG. 1 is intended to provide a brief, general description of suitable computer hardware and a suitable computing environment in conjunction with which the invention may be implemented.
  • the invention is described in the general context of computer-executable instructions, such as program modules, being executed by a computer, such as a personal computer.
  • program modules include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types.
  • the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, network PC's, minicomputers, mainframe computers, and the like.
  • the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • program modules may be located in both local and remote memory storage devices.
  • the exemplary hardware and operating environment of FIG. 1 for implementing the invention includes a general purpose computing device in the form of a computer 20 , including a processing unit 21 , a system memory 22 , and a system bus 23 that operatively couples various system components include the system memory to the processing unit 21 .
  • a processing unit 21 There may be only one or there may be more than one processing unit 21 , such that the processor of computer 20 comprises a single central-processing unit (CPU), or a plurality of processing units, commonly referred to as a parallel processing environment.
  • the computer 20 may be a conventional computer, a distributed computer, or any other type of computer; the invention is not so limited.
  • the system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
  • the system memory may also be referred to as simply the memory, and includes read only memory (ROM) 24 and random access memory (RAM) 25 .
  • ROM read only memory
  • RAM random access memory
  • a basic input/output system (BIOS) 26 containing the basic routines that help to transfer information between elements within the computer 20 , such as during start-up, is stored in ROM 24 .
  • the computer 20 further includes a hard disk drive 27 for reading from and writing to a hard disk, not shown, a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29 , and an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD ROM or other optical media.
  • a hard disk drive 27 for reading from and writing to a hard disk, not shown
  • a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29
  • an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD ROM or other optical media.
  • the hard disk drive 27 , magnetic disk drive 28 , and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32 , a magnetic disk drive interface 33 , and an optical disk drive interface 34 , respectively.
  • the drives and their associated computer-readable media provide nonvolatile storage of computer-readable instructions, data structures, program modules and other data for the computer 20 . It should be appreciated by those skilled in the art that any type of computer-readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, random access memories (RAMs), read only memories (ROMs), and the like, may be used in the exemplary operating environment.
  • a number of program modules may be stored on the hard disk, magnetic disk 29 , optical disk 31 , ROM 24 , or RAM 25 , including an operating system 35 , one or more application programs 36 , other program modules 37 , and program data 38 .
  • a user may enter commands and information into the personal computer 20 through input devices such as a keyboard 40 and pointing device 42 .
  • Other input devices may include a microphone, joystick, game pad, satellite dish, scanner, or the like.
  • These and other input devices are often connected to the processing unit 21 through a serial port interface 46 that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, game port, or a universal serial bus (USB).
  • a monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48 .
  • computers typically include other peripheral output devices (not shown), such as speakers and printers.
  • the computer 20 may operate in a networked environment using logical connections to one or more remote computers, such as remote computer 49 . These logical connections are achieved by a communication device coupled to or a part of the computer 20 ; the invention is not limited to a particular type of communications device.
  • the remote computer 49 may be another computer, a server, a router, a network PC, a client, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 20 , although only a memory storage device 50 has been illustrated in FIG. 1 .
  • the logical connections depicted in FIG. 1 include a local-area network (LAN) 51 and a wide-area network (WAN) 52 .
  • LAN local-area network
  • WAN wide-area network
  • Such networking environments are commonplace in office networks, enterprise-wide computer networks, intranets and the Internal, which are all types of networks.
  • the computer 20 When used in a LAN-networking environment, the computer 20 is connected to the local network 51 through a network interface or adapter 53 , which is one type of communications device.
  • the computer 20 When used in a WAN-networking environment, the computer 20 typically includes a modem 54 , a type of communications device, or any other type of communications device for establishing communications over the wide area network 52 , such as the Internal.
  • the modem 54 which may be internal or external, is connected to the system bus 23 via the serial port interface 46 .
  • program modules depicted relative to the personal computer 20 may be stored in the remote memory storage device. It is appreciated that the network connections shown are exemplary and other means of and communications devices for establishing a communications link between the computers may be used.
  • an illustrative example according to an embodiment of the invention is first described in this section of the detailed description, with reference to FIG. 2 .
  • embodiments of the invention are not limited to any particular application.
  • such applications include scheduling appointments, scoping calendars to appropriate ranges, forwarding messages, and sending various alerts to user.
  • the example described in this section specifically relates to directing automated services for messaging and scheduling.
  • an electronic mail is shown in a window 200 .
  • the window 200 may be part of an electronic mail program, such as those available within the art.
  • the electronic mail has the text, from a user named Bob, reading “How about lunch on Thursday?”.
  • a window 202 of the scheduling program appears, such as scheduling programs available within the art.
  • the embodiment of the invention causes a scheduling entry to be entered in the user's calendar for Thursday, at noon, reading “Lunch with Bob.”
  • the embodiment of the invention of FIG. 2 determines the action probability of the text of the electronic mail in the in the window 200 , and makes a decision for automatic scheduling based on the probability of the message. It then performs a scheduling action—parsing the text of the electronic message, and entering the entry in the scheduling program as is shown in the window 202 .
  • the embodiment of the invention is able to recognize that “Lunch” means about noon in time, and that “lunch on Thursday” in general has a high scheduling probability (that is, a high probability that the electronic mail relates to a scheduling task).
  • FIG. 2 is meant only to illustrate how embodiments of the invention can operate, for purposes of understanding operation of embodiments of the invention, and does not represent limitations of the invention itself.
  • the computer-implemented methods are desirably realized at least in part as one or more programs running on a computer—that is, as a program executed from a computer-readable medium such as a memory by a processor of a computer.
  • the programs are desirably storable on a machine-readable medium such as a floppy disk or a CD-ROM, for distribution and installation and execution on another computer.
  • the method specifically determines a text to analyze.
  • the text can be a message of an electronic mail program that currently has focus.
  • a message having focus is the message of the window that is currently open within a graphical user interface operating system.
  • ten windows may be open on the screen, such that each window has an electronic mail message therein.
  • the window that is currently selected by the user is the window that is currently active, and thus the window that has focus. It is this window that the method selects in 300 in one embodiment of the invention, although the invention is not so limited.
  • the text to be analyzed can be user input—for example, by the user copying or cutting text to a clipboard, as known within the art, and then invoking 300 of the method based on this text. The invention is not so limited.
  • the method next determines an action probability based on the text.
  • the action probability of the text generally refers to the probability that the text relates to an action task. For example, in the context of scheduling programs, in general, a message reading “Good luck, Bob, on your new venture” has a low action probability, since it does not have subject matter relating to a scheduling task. Conversely, for example, in the context of scheduling programs, in general, a message reading “The next departmental meeting will be held at 5 P.M. on October 23” has a high action probability, since it does have subject matter relating to a scheduling task.
  • the probability that a user might like to schedule an appointment based on the content of the email is not only influenced by the patterns of text in the body of the message but also by other information, such as organizational information and patterns of information in the header.
  • the probability of a user having the goal of scheduling an appointment based on a message addressed only to the user might be typically greater than the probability of having such a goal with a message addressed to a large group of users.
  • a message from someone's manager about a meeting addressed only to a user or to a small group might be associated with a higher probability of the user wishing to schedule an appointment based on the information contained in the associated message than if the message was from another person in the organization, or sent to a large group of people.
  • the action probability of a text is the probability that the user's goal for the text is to perform an action based on the message—in the case of the example, either to open and review one's calendar for the times represented by the text of the message, to schedule an appointment, or to set up a group meeting.
  • the action probability is determined in 302 by passing the text as input to a model such as a text classification system such as a one based on a classifier provided by a Support Vector Machine, as are known within the art.
  • a model utilized is as described in U.S. Pat. No. 5,864,848, issued Jan. 26, 1999, which is hereby incorporated by reference.
  • the model utilized is as described in the previously filed and coassigned case entitled “METHODS AND APPARATUS FOR BUILDING A SUPPORT VECTOR MACHINE CLASSIFIER,” Ser. No. 09/055,477, filed on Apr. 6, 1998, which is also hereby incorporated by reference.
  • further information regarding the training of these models for the particular application in this case is later described in this application.
  • the first probability threshold can be 0.4, while the second probability threshold can be 0.7. If a text has an action probability of 0.6, then the method selects action with user approval.
  • the inaction option relates to texts not having subject matter with high action probabilities
  • the action with user approval option relates to texts having subject matter with medium action probabilities
  • the automatic action option relates to texts having subject matter with high action probabilities.
  • the invention is not limited as to the manner by which the probability thresholds are determined. In one embodiment, they are set directly by users. For example, with respect to the second probability threshold, the user may be intolerant of potentially erroneous inferences leading to unwanted dialog or automatic actions, and thus not want automatic action to occur unless the text being analyzed has a very high threshold probability for action, say over 90%. Conversely, for example, a user becoming more accustomed and trusting of automatic action may not want to be bothered with dialogs seeking confirmation of suggested actions, and thus may set the second probability threshold to 70%, which means that texts having probability thresholds over 70% are automatically scheduled.
  • the probability thresholds of the boundaries among the options that can be selected by the method are set in accordance with decision theory, based on a cost/benefit analysis to provide for probability thresholds. This is described in more detail later in the detailed description.
  • Examples of actions that are amenable to the invention include scheduling appointments, scoping of calendars to appropriate ranges, forwarding messages, and sending various alerts to users; other examples include forwarding, paging, routing and moving of or based on texts such as electronic mail messages, as those of ordinary skill within the art can appreciate. Other examples include extraction of contact information, and extraction of maps or directions.
  • the scheduling action can be performed in a manner balancing precision and confidence of the action, as is particularly described in the copending, cofiled and coassigned application entitled “Systems and Methods for Directing Automated Services for Messaging and Scheduling”, which has already been incorporated by reference.
  • FIG. 4 a flowchart of a method to train a classification system that takes into consideration text of email or other documents, as well as such information as distinctions and patterns in an email header such as sender and recipient information, information about the organizational relationships between the user and the sender, and contextual information, such as recent user activity in scanning the message.
  • the classification system can be based on the use of different methods for automated classification.
  • the embodiment of the invention employs a Support Vector Machine for use in determining an action probability of a message.
  • the flowchart of FIG. 4 can be used to train a model that is used by 302 of FIG. 3 to determine a action probability of a message. That is, the flowchart of FIG. 4 can be used to initially generate the model used by 302 of FIG. 3 .
  • text classification systems and support vector machines are known within the art. Therefore, description of the method of FIG. 4 is specifically geared towards description of adaptation of such models for the applications used herein, as those of ordinary skill within the art can understand.
  • a feature selection phase is performed.
  • Feature selection generally is known within the art.
  • the feature selection phase is used to identify features to be used in a classification model that maximally discriminates between text that should be acted upon, and text that should not be acted upon. In one embodiment, this is accomplished by training the model. That is, a number of texts based on which action is to occur (e.g., 500 texts) are input into the feature selection phase, such that the phase knows a priori that the texts are such that action is to occur, and a number of texts based on which action is not to occur (e.g., 500 texts) are input into the feature selection phase, such that the phase knows a priori that the texts are such that action is not to occur.
  • the model can then determine a set of features that offer a maximum discrimination between those texts that are action related, and those texts that are not action related.
  • feature selection is enhanced beyond consideration of single words through an initial seeding with domain-specific knowledge about potentially discriminating phrases and patterns of text, header information, and organizational information that may be useful for discrimination.
  • the domain-specific knowledge can include words and phrases that typically are associated with action-related texts. For example, in the context of scheduling, such multi-word phrases may include “ . . . get lunch,” “let's meet,” “how would [DAY] be,” “ . . . to meet with,” etc.
  • a model-construction phase is performed based on the feature selection. That is a model, such as a text classification system based on a support vector machine, as known within the art, is constructed, based on the feature selection accomplished in 400 .
  • the construction of such systems and machines, and such models generally, is known within the art.
  • a component of inferring beliefs about a user's intention is to develop models for assigning likelihoods to alternate user intentions.
  • probabilistic models of a user's goals have been employed to continue to infer the probability of alternate feasible goals as a function of observables including the current program context, a user's sequence of actions, and choice of words used in a query.
  • Bayesian network models have been utilized.
  • a model that is used to make decisions about actions is a text classification system, such as a naive Bayesian text classifier, a text classification system based on support vector machine analysis, and an efficient linear support vector machine approximation.
  • a text classification system such as a naive Bayesian text classifier, a text classification system based on support vector machine analysis, and an efficient linear support vector machine approximation.
  • these models are described in S. T. Dumais, J. Platt, D. Heckerman and M. Sahami, “Inductive Learning Algorithms and Representations for Text Categorization,” Proceedings of ACM-CIKM98, November 1998, which is hereby incorporated by reference, and in J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference, Morgan Kaufmann Publishers: San Francisco, 1991 (ISBN 1558604790), which is also hereby incorporated by reference.
  • Text-classification methods in particular are used for learning and reasoning reason about the likelihood of user goals within a context.
  • a linear support vector machine text classifier thus is built by training the system on a set of messages that are calendar relevant and calendar irrelevant, such that, at run-time, for each message being reviewed, the classifier outputs the likelihood that the user will wish to bring up a calendar or schedule an appointment.
  • the probability of goals of a user given observed evidence can be written p(G
  • the probability that a user wishes to schedule is thus computed from evidence in patterns of text contained in a message that has been recently opened.
  • For decisions about action versus inaction there are four deterministic outcomes: either the user has the goal being considered or does not have the goal, and for each of these states of user intention, an action either is taken or note taken.
  • a measure of the value associated with each outcome thus is mapped to a utility on a zero to one scale, such that the utilities are defined as follows:
  • u(A, G) the utility of taking action A when goal G is true
  • u(A, not G) the utility of taking action A when goal G is not true
  • u(not A, G) the utility of not taking action A when goal G is true
  • E), is computed by combining the utilities of the outcomes for the case where the user desires service and does not desired a service, weighted by the probability of each outcome, as follows,
  • E ) p ( G
  • E ) p ( G
  • E ) p ( G
  • Graph 600 of FIG. 6 is such that where the horizontal represents the probability the user has a goal, ranging from zero to one.
  • the vertical axis indicates the expected value of the system's response.
  • the two outcomes displayed on the right vertical axis have a value associated with p(G
  • E) 1.0 ⁇ the user indeed having the goal under consideration.
  • the outcomes listed on the left vertical axis indicate the value of the outcomes when p(G
  • E) 0.
  • E) is a line joining the two deterministic outcomes associated with taking action.
  • the expected value of not acting is a similar line joining the two outcomes associated with inaction.
  • the lines cross at a specific probability of the user having a goal.
  • this threshold probability referred to as p*
  • the expected value of action and inaction are equal.
  • E) is the option associated with the greatest expected value at that likelihood of a user having the goal. Inspection of the graph 600 shows that it is better for the user to act if the probability of a goal is greater than p* and to refrain from acting if the probability is less than p*.
  • the threshold probability for any four utilities can be computed by setting the above two equations equal to one another and solving for p(G
  • the threshold probability, p* can change dynamically as the value associated with one or more of the outcomes may be a function of the context.
  • the utility, u(A, not G) associated with the situation where a system takes action when a goal is not desired, may be greater where more screen real estate is made available. Increased screen real estate can diminish the perceived costs of the needless operation of a scheduling service that may bring up an appointment that obscures items at a user's focus of attention.
  • FIG. 5 displays geometrically how the solution to p* can change when the utility u(A, not G) increases. As demonstrated in the graph 700 of FIG. 5 , increasing the value (decreasing the cost) of acting erroneously leads to a lowering of the threshold probability that must be crossed before action occurs.
  • the utility of engaging in a dialog with a user when the user does not have the goal in question is generally greater than the utility of performing an action when the goal is not desired.
  • the utility of asking a user before performing a desired action is typically smaller than the utility of simply performing a desired action when the user indeed has the goal.
  • action can be guided by two threshold probabilities.
  • the two threshold probabilities are the threshold between inaction and dialog, p* not A, D , and the threshold between dialog and action, p* D, A .
  • the system of FIG. 7 includes an action direction program 902 , and a program 904 .
  • one or more of the programs 902 and 904 is a computer program executed by a processor of a computer (such as the computer described in conjunction with FIG. 1) from a computer-readable medium, such as a memory, of the computer.
  • the action direction program 902 has an input 908 , for example, from an electronic mail program (not shown in FIG. 7 ), or another programs (also not shown in FIG. 7 ).
  • the action direction program 902 provides an action 910 as an output, which is utilized by the program 904 .
  • the input 908 to the action direction program 902 is in one embodiment text, such as the message of an electronic mail as can be provided by an electronic mail program, although the invention is not so limited.
  • the program 904 is a program that is able to perform the action 910 .
  • the program 904 is a scheduling program in which a user is able to track appointments within a calendar, such that the action 910 includes a scheduling action that the scheduling program can act upon (e.g., a specific appointment, etc.).
  • the action direction program 902 is a program in which appointments can be gleaned from the input 908 to be made in conjunction with the scheduling program.
  • the action direction program 902 first determines an action probability based on the input 908 . Based thereon, it selects one of the following three options: (1) inaction, (2) automatic action, and (3) suggested action with user approval. If either option (2) is selected, or option (3) is selected and the user has approved the suggested action, then the action direction program 902 performs an action 910 within the program 904 . In one embodiment, this determination of an action probability and the option selection based thereon is made by the program 902 in accordance with the methods previously described, although the invention itself is not necessarily so limited.

Abstract

A decision-theoretic approach for guiding automated actions. In one embodiment, a computer-implemented method first determines a text to analyze. The method then determines an action probability based on the text. Words and phrases as well as information in special fields, such as distinctions and patterns in the header of email, observations about recent user activity, and organizational information are considered in classification. Based on the inferred probability that a user has a goal under consideration, the method selects one of the following options: (1) inaction, (2) automatic action, or (3) suggested action with user approval. Upon the method selecting either the (1) automatic action option or the (2) suggested action with user approval option—the latter also in conjunction with receiving actual user approval—the method performs an action based on the text.

Description

RELATED APPLICATIONS
This application is related to the coassigned and cofiled applications entitled “Systems and Methods for Directing Automated Services for Messaging and Scheduling”, and “Learning by Observing a User's Activity for Enhancing the Provision of Automated Services”, both of which are hereby incorporated by reference.
FIELD OF THE INVENTION
This invention relates generally to decision theory, and its application to automated decision making when used in conjunction with automated classification systems such as text classification systems, and more particularly to utilizing decision theory for guiding automated user interface, communication, and system actions.
BACKGROUND OF THE INVENTION
Computer applications such as messaging and scheduling applications have become important applications in many computer users' lives. Messaging programs generally allow a user to send and receive electronic mail (e.g., messages) to and from other computer users, for example, over a local- or a wide-area network, or over an intranet, extranet, or the Internet. Online schedule and calendar programs generally allow a user to create and to track appointments in a calendar. More sophisticated scheduling programs allow one user to schedule a group meeting with other computer users—checking the latter users' schedule availability, and receiving confirmation from the users upon them accepting or rejecting the group meeting appointment.
Within the prior art, however, messaging and scheduling programs are generally not very well integrated, even if they are components within the same computer program. For example, a user may receive a message from a colleague stating “Looking forward to seeing you at 2 on Thursday.” Generally, however, the prior art does not provide for automatically directing the scheduling program to make a meeting appointment at 2 p.m. on Thursday. Instead, typically the user who has received the message has to open the scheduling program, access Thursday's calendar, and manually enter an appointment at 2 p.m. on Thursday's calendar. Because of the many steps required to go from reading the message within the messaging program to entering the information into the scheduling program, many users choose not to even use scheduling programs, or to only use them sparingly.
For these and other reasons, there is a need for the present invention.
SUMMARY OF THE INVENTION
The invention relates to the use of decision theory for directing automated actions. In one embodiment, a computer-implemented method first determines a text to analyze. The method then determines an action probability based on the text and/or contextual information (e.g., information regarding recent user activity, organizational information, etc.), and based on the action probability, selects one of the following options: (1) inaction, (2) automatic action, or (3) suggested action with user approval. Upon the method selecting either the (1) automatic action option or the (2) suggested action with user approval option—the latter also in conjunction with receiving actual user approval—the method performs an action based on the text.
Embodiments of the invention provide for advantages not found within the prior art. For example, in the context of scheduling appointments based on the text input, the method can perform an action based on the text, upon determining the action probability of the text. Based on the action probability the method determines if it should do nothing (i.e., corresponding to a low probability), do something automatically (i.e., corresponding to a high probability), or suggest an action, but do not do it automatically (i.e., corresponding to a medium probability). Thus, one embodiment of the invention effectively links scheduling with messaging automatically. It is noted that the invention itself is not limited to the application of scheduling and messaging, however; for example, other actions that can be based on the text analyzed including extracting contact information and storing the information in an address book, forwarding, paging, routing and moving, as those of ordinary skill within the art can appreciate.
The invention includes computer-implemented methods, machine-readable media, computerized systems, and computers of varying scopes. Other aspects, embodiments and advantages of the invention, beyond those described here, will become apparent by reading the detailed description and with reference to the drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a diagram of an operating environment in conjunction with which embodiments of the invention can be practiced;
FIG. 2 is a diagram of an example of directed scheduling, according to an embodiment of the invention;
FIG. 3 is a flowchart of a method according to an embodiment of the invention;
FIG. 4 is a flowchart of a method to construct a model utilized to determine an action probability of a text, according to an embodiment of the invention;
FIG. 5 is a graph in accordance with an application of decision theory that can be utilized in conjunction with embodiments of the invention;
FIG. 6 is another graph in accordance with an application of decision theory that can be utilized in conjunction with embodiments of the invention; and,
FIG. 7 is a diagram of a system according to an embodiment of the invention.
DETAILED DESCRIPTION OF THE INVENTION
In the following detailed description of exemplary embodiments of the invention, reference is made to the accompanying drawings which form a part hereof, and in which is shown by way of illustration specific exemplary embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention, and it is to be understood that other embodiments may be utilized and that logical, mechanical, electrical and other changes may be made without departing from the spirit or scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims.
Some portions of the detailed descriptions which follow are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated.
It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like. It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout the present invention, discussions utilizing terms such as processing or computing or calculating or determining or displaying or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
Operating Environment
Referring to FIG. 1, a diagram of the hardware and operating environment in conjunction with which embodiments of the invention may be practiced is shown. The description of FIG. 1 is intended to provide a brief, general description of suitable computer hardware and a suitable computing environment in conjunction with which the invention may be implemented. Although not required, the invention is described in the general context of computer-executable instructions, such as program modules, being executed by a computer, such as a personal computer. Generally, program modules include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types.
Moreover, those skilled in the art will appreciate that the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, network PC's, minicomputers, mainframe computers, and the like. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
The exemplary hardware and operating environment of FIG. 1 for implementing the invention includes a general purpose computing device in the form of a computer 20, including a processing unit 21, a system memory 22, and a system bus 23 that operatively couples various system components include the system memory to the processing unit 21. There may be only one or there may be more than one processing unit 21, such that the processor of computer 20 comprises a single central-processing unit (CPU), or a plurality of processing units, commonly referred to as a parallel processing environment. The computer 20 may be a conventional computer, a distributed computer, or any other type of computer; the invention is not so limited.
The system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. The system memory may also be referred to as simply the memory, and includes read only memory (ROM) 24 and random access memory (RAM) 25. A basic input/output system (BIOS) 26, containing the basic routines that help to transfer information between elements within the computer 20, such as during start-up, is stored in ROM 24. The computer 20 further includes a hard disk drive 27 for reading from and writing to a hard disk, not shown, a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29, and an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD ROM or other optical media.
The hard disk drive 27, magnetic disk drive 28, and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32, a magnetic disk drive interface 33, and an optical disk drive interface 34, respectively. The drives and their associated computer-readable media provide nonvolatile storage of computer-readable instructions, data structures, program modules and other data for the computer 20. It should be appreciated by those skilled in the art that any type of computer-readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, random access memories (RAMs), read only memories (ROMs), and the like, may be used in the exemplary operating environment.
A number of program modules may be stored on the hard disk, magnetic disk 29, optical disk 31, ROM 24, or RAM 25, including an operating system 35, one or more application programs 36, other program modules 37, and program data 38. A user may enter commands and information into the personal computer 20 through input devices such as a keyboard 40 and pointing device 42. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 21 through a serial port interface 46 that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, game port, or a universal serial bus (USB). A monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48. In addition to the monitor, computers typically include other peripheral output devices (not shown), such as speakers and printers.
The computer 20 may operate in a networked environment using logical connections to one or more remote computers, such as remote computer 49. These logical connections are achieved by a communication device coupled to or a part of the computer 20; the invention is not limited to a particular type of communications device. The remote computer 49 may be another computer, a server, a router, a network PC, a client, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 20, although only a memory storage device 50 has been illustrated in FIG. 1. The logical connections depicted in FIG. 1 include a local-area network (LAN) 51 and a wide-area network (WAN) 52. Such networking environments are commonplace in office networks, enterprise-wide computer networks, intranets and the Internal, which are all types of networks.
When used in a LAN-networking environment, the computer 20 is connected to the local network 51 through a network interface or adapter 53, which is one type of communications device. When used in a WAN-networking environment, the computer 20 typically includes a modem 54, a type of communications device, or any other type of communications device for establishing communications over the wide area network 52, such as the Internal. The modem 54, which may be internal or external, is connected to the system bus 23 via the serial port interface 46. In a networked environment, program modules depicted relative to the personal computer 20, or portions thereof, may be stored in the remote memory storage device. It is appreciated that the network connections shown are exemplary and other means of and communications devices for establishing a communications link between the computers may be used.
Illustrative Example
Prior to describing methods and systems of embodiments of the invention, an illustrative example according to an embodiment of the invention is first described in this section of the detailed description, with reference to FIG. 2. As stated in the summary, embodiments of the invention are not limited to any particular application. For example, in different embodiments of the invention, such applications include scheduling appointments, scoping calendars to appropriate ranges, forwarding messages, and sending various alerts to user. The example described in this section specifically relates to directing automated services for messaging and scheduling. Thus, in the example of FIG. 2, an electronic mail is shown in a window 200. The window 200 may be part of an electronic mail program, such as those available within the art. The electronic mail has the text, from a user named Bob, reading “How about lunch on Thursday?”. In one embodiment of the invention, a window 202 of the scheduling program appears, such as scheduling programs available within the art. The embodiment of the invention causes a scheduling entry to be entered in the user's calendar for Thursday, at noon, reading “Lunch with Bob.”
In other words, the embodiment of the invention of FIG. 2 determines the action probability of the text of the electronic mail in the in the window 200, and makes a decision for automatic scheduling based on the probability of the message. It then performs a scheduling action—parsing the text of the electronic message, and entering the entry in the scheduling program as is shown in the window 202. Thus, the embodiment of the invention is able to recognize that “Lunch” means about noon in time, and that “lunch on Thursday” in general has a high scheduling probability (that is, a high probability that the electronic mail relates to a scheduling task).
Those of ordinary skill within the art can appreciate that the example of FIG. 2 is meant only to illustrate how embodiments of the invention can operate, for purposes of understanding operation of embodiments of the invention, and does not represent limitations of the invention itself.
Methods
In this section of the detailed description, computer-implemented methods according to varying embodiments of the invention are described. The computer-implemented methods are desirably realized at least in part as one or more programs running on a computer—that is, as a program executed from a computer-readable medium such as a memory by a processor of a computer. The programs are desirably storable on a machine-readable medium such as a floppy disk or a CD-ROM, for distribution and installation and execution on another computer.
A general method of an embodiment of the invention is first described in conjunction with FIG. 3, which is a flowchart of a method according to an embodiment of the invention. In 300, the method specifically determines a text to analyze. For example, the text can be a message of an electronic mail program that currently has focus. A message having focus is the message of the window that is currently open within a graphical user interface operating system. For example, ten windows may be open on the screen, such that each window has an electronic mail message therein. The window that is currently selected by the user is the window that is currently active, and thus the window that has focus. It is this window that the method selects in 300 in one embodiment of the invention, although the invention is not so limited. As another example, the text to be analyzed can be user input—for example, by the user copying or cutting text to a clipboard, as known within the art, and then invoking 300 of the method based on this text. The invention is not so limited.
In 302, the method next determines an action probability based on the text. The action probability of the text generally refers to the probability that the text relates to an action task. For example, in the context of scheduling programs, in general, a message reading “Good luck, Bob, on your new venture” has a low action probability, since it does not have subject matter relating to a scheduling task. Conversely, for example, in the context of scheduling programs, in general, a message reading “The next departmental meeting will be held at 5 P.M. on October 23” has a high action probability, since it does have subject matter relating to a scheduling task. The probability that a user might like to schedule an appointment based on the content of the email is not only influenced by the patterns of text in the body of the message but also by other information, such as organizational information and patterns of information in the header. For example, the probability of a user having the goal of scheduling an appointment based on a message addressed only to the user might be typically greater than the probability of having such a goal with a message addressed to a large group of users. Likewise, a message from someone's manager about a meeting addressed only to a user or to a small group might be associated with a higher probability of the user wishing to schedule an appointment based on the information contained in the associated message than if the message was from another person in the organization, or sent to a large group of people.
In other words, the action probability of a text is the probability that the user's goal for the text is to perform an action based on the message—in the case of the example, either to open and review one's calendar for the times represented by the text of the message, to schedule an appointment, or to set up a group meeting. In one embodiment of the invention, the action probability is determined in 302 by passing the text as input to a model such as a text classification system such as a one based on a classifier provided by a Support Vector Machine, as are known within the art. In particular, in one embodiment of the invention, the model utilized is as described in U.S. Pat. No. 5,864,848, issued Jan. 26, 1999, which is hereby incorporated by reference. In another embodiment of the invention, the model utilized is as described in the previously filed and coassigned case entitled “METHODS AND APPARATUS FOR BUILDING A SUPPORT VECTOR MACHINE CLASSIFIER,” Ser. No. 09/055,477, filed on Apr. 6, 1998, which is also hereby incorporated by reference. In addition, further information regarding the training of these models for the particular application in this case is later described in this application.
Once the action probability of the text has been determined in 302, then in 304, the method makes a decision based on the probability. More specifically, the method selects one of three options. First, the method can select inaction—that is, not to perform any action based on the message. Second, the method can select to engage the user in a dialog about taking an action, and seek user approval before invoking action—that is, to perform an action based on the text, but only after receiving confirmation from the user that the method should go ahead and perform the action. Third, the method can select automatic action—that is, to perform an action based on the text, automatically, without first receiving confirmation from the user. It is noted that this is only in one embodiment; in other embodiments of the invention, more than three options are possible, as those of ordinary skill within the art can appreciate.
In one embodiment of the invention, the method determines which of the three options to select based on probability thresholds associated with the boundaries among the three options. A first probability threshold is associated with the inaction | action with user approval boundary, and a second probability threshold is associated with the action with user approval | automatic action boundary. If the action probability is less than the first probability threshold, then the method selects inaction. If the action probability is greater than the first probability threshold but less than the second probability threshold, then the method selects action with user approval. Finally, if the action probability is greater than the second probability threshold, then the method selects automatic action.
An example is illustrative in understanding the probability thresholds. For example, the first probability threshold can be 0.4, while the second probability threshold can be 0.7. If a text has an action probability of 0.6, then the method selects action with user approval. In general, the inaction option relates to texts not having subject matter with high action probabilities; the action with user approval option relates to texts having subject matter with medium action probabilities; and, the automatic action option relates to texts having subject matter with high action probabilities.
The invention is not limited as to the manner by which the probability thresholds are determined. In one embodiment, they are set directly by users. For example, with respect to the second probability threshold, the user may be intolerant of potentially erroneous inferences leading to unwanted dialog or automatic actions, and thus not want automatic action to occur unless the text being analyzed has a very high threshold probability for action, say over 90%. Conversely, for example, a user becoming more accustomed and trusting of automatic action may not want to be bothered with dialogs seeking confirmation of suggested actions, and thus may set the second probability threshold to 70%, which means that texts having probability thresholds over 70% are automatically scheduled.
In other embodiments of the invention, the probability thresholds of the boundaries among the options that can be selected by the method are set in accordance with decision theory, based on a cost/benefit analysis to provide for probability thresholds. This is described in more detail later in the detailed description.
Finally, in 306, the method performs an action based on the decision made in 304. That is, if automatic action was selected in 304, or if action with user approval was selected in 304 and actual user approval was received, then in 306 the action is performed. Conversely, if inaction was selected in 304, or if action with user approval was selected in 304 and actual user approval was not received, then in 306 no action is performed. The invention is not limited to a particular action or set of actions. Examples of actions that are amenable to the invention include scheduling appointments, scoping of calendars to appropriate ranges, forwarding messages, and sending various alerts to users; other examples include forwarding, paging, routing and moving of or based on texts such as electronic mail messages, as those of ordinary skill within the art can appreciate. Other examples include extraction of contact information, and extraction of maps or directions. In one specific embodiment relating to scheduling appointments, the scheduling action can be performed in a manner balancing precision and confidence of the action, as is particularly described in the copending, cofiled and coassigned application entitled “Systems and Methods for Directing Automated Services for Messaging and Scheduling”, which has already been incorporated by reference.
Referring next to FIG. 4, a flowchart of a method to train a classification system that takes into consideration text of email or other documents, as well as such information as distinctions and patterns in an email header such as sender and recipient information, information about the organizational relationships between the user and the sender, and contextual information, such as recent user activity in scanning the message. The classification system can be based on the use of different methods for automated classification. The embodiment of the invention, employs a Support Vector Machine for use in determining an action probability of a message. For example, the flowchart of FIG. 4 can be used to train a model that is used by 302 of FIG. 3 to determine a action probability of a message. That is, the flowchart of FIG. 4 can be used to initially generate the model used by 302 of FIG. 3. As has been stated, text classification systems and support vector machines are known within the art. Therefore, description of the method of FIG. 4 is specifically geared towards description of adaptation of such models for the applications used herein, as those of ordinary skill within the art can understand.
In 400, a feature selection phase is performed. Feature selection generally is known within the art. The feature selection phase is used to identify features to be used in a classification model that maximally discriminates between text that should be acted upon, and text that should not be acted upon. In one embodiment, this is accomplished by training the model. That is, a number of texts based on which action is to occur (e.g., 500 texts) are input into the feature selection phase, such that the phase knows a priori that the texts are such that action is to occur, and a number of texts based on which action is not to occur (e.g., 500 texts) are input into the feature selection phase, such that the phase knows a priori that the texts are such that action is not to occur. Thus, the model can then determine a set of features that offer a maximum discrimination between those texts that are action related, and those texts that are not action related.
In addition, in one embodiment of the invention, feature selection is enhanced beyond consideration of single words through an initial seeding with domain-specific knowledge about potentially discriminating phrases and patterns of text, header information, and organizational information that may be useful for discrimination. The domain-specific knowledge can include words and phrases that typically are associated with action-related texts. For example, in the context of scheduling, such multi-word phrases may include “ . . . get lunch,” “let's meet,” “how would [DAY] be,” “ . . . to meet with,” etc. A list of such words and phrases that are used in one specific embodiment of the invention in the context of scheduling is provided in the cofiled, coassigned, and copending application entitled “Systems and Methods for Directing Automated Services for Messaging and Scheduling”, which has already been incorporated by reference. Those of ordinary skill within the art understand how such domain-specific knowledge can be used to seed feature selection to provide for maximum discrimination between action-related and non-action-related texts.
Next, in 402, once feature selection has been accomplished in 400, a model-construction phase is performed based on the feature selection. That is a model, such as a text classification system based on a support vector machine, as known within the art, is constructed, based on the feature selection accomplished in 400. The construction of such systems and machines, and such models generally, is known within the art.
Beliefs, Goals, and Actions
In this section of the detailed description, information is provided about inferring beliefs about a user's goals, and determining automated actions to take based on a user's goals, that can be utilized in conjunction with embodiments of the invention. More specifically, description is provided as to how decision theory and cost-benefit analysis in particular can be utilized in conjunction with embodiments of the invention, as has been described. Some portions of this description are presented in conjunction with the specific application and/or context of scheduling appointments in a calendar; however, the invention is not so limited to such an application and/or context, as has already been stated.
A component of inferring beliefs about a user's intention is to develop models for assigning likelihoods to alternate user intentions. In the prior art, probabilistic models of a user's goals have been employed to continue to infer the probability of alternate feasible goals as a function of observables including the current program context, a user's sequence of actions, and choice of words used in a query. Also within the prior art, Bayesian network models have been utilized.
In one embodiment of the invention, a model that is used to make decisions about actions is a text classification system, such as a naive Bayesian text classifier, a text classification system based on support vector machine analysis, and an efficient linear support vector machine approximation. In particular, these models are described in S. T. Dumais, J. Platt, D. Heckerman and M. Sahami, “Inductive Learning Algorithms and Representations for Text Categorization,” Proceedings of ACM-CIKM98, November 1998, which is hereby incorporated by reference, and in J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference, Morgan Kaufmann Publishers: San Francisco, 1991 (ISBN 1558604790), which is also hereby incorporated by reference. These models are also described in the reference M. Sahami, S. Dumais, D. Heckerman, E. Horvitz, A Bayesian Approach to Junk E-Mail Filtering, AAAI Workshop on Text Classification, July 1998, Madison, Wis., AAAI Technical Report WS-98-05, which is hereby incorporated by reference.
Text-classification methods in particular are used for learning and reasoning reason about the likelihood of user goals within a context. For the context of a user reviewing electronic mail, for example, and the task of calendaring and scheduling, it is desirable to assign a likelihood that an electronic mail message that has just received the focus of attention is in the goal category of “User will wish to schedule or review a calendar for this electronic mail” versus the goal category of “User will not wish to schedule or review a calendar for this electronic mail” based on the content of the message. A linear support vector machine text classifier thus is built by training the system on a set of messages that are calendar relevant and calendar irrelevant, such that, at run-time, for each message being reviewed, the classifier outputs the likelihood that the user will wish to bring up a calendar or schedule an appointment.
Next, given the beliefs about a user's goal, a decision must be made as to whether an automated action should be taken. From the perspective of decision theory, decisions about action versus inaction are directed by expected value. Autonomous actions are only taken when they have greater expected value than inaction to the user, taking into consideration the costs, benefits, and uncertainties of a user's goal.
The probability of goals of a user given observed evidence can be written p(G|E). The probability that a user wishes to schedule is thus computed from evidence in patterns of text contained in a message that has been recently opened. For decisions about action versus inaction, there are four deterministic outcomes: either the user has the goal being considered or does not have the goal, and for each of these states of user intention, an action either is taken or note taken. A measure of the value associated with each outcome thus is mapped to a utility on a zero to one scale, such that the utilities are defined as follows:
u(A, G): the utility of taking action A when goal G is true
u(A, not G): the utility of taking action A when goal G is not true
u(not A, G): the utility of not taking action A when goal G is true, and
u(not A, not G): the utility of not taking action A when goal G is not true
The expected utility of taking autonomous action to assist the user with an action given observed evidence, u(A|E), is computed by combining the utilities of the outcomes for the case where the user desires service and does not desired a service, weighted by the probability of each outcome, as follows,
u(A|E)=p(G|E)u(A, G)+p(not G|E)u(A, not G).
This equation can be rewritten in terms of p(G|E), by noting that p(G|E)=1−p(not G|E).
Thus, the expected utility of providing autonomous service is,
u(A|E)=p(G|E)u(A|G)+[1−p(G|E)]u(A, not G).
The expected utility of not taking autonomous action to assist the user, u(not A|E) is,
u(not A|E)=p(G|E)u(not A, G)+[1−p(G|E)]u(not A, not G).
The implications of these equations for the expected value of acting and not acting can be visualized, by plotting the lines they define, as shown in FIG. 6. Graph 600 of FIG. 6 is such that where the horizontal represents the probability the user has a goal, ranging from zero to one. The vertical axis indicates the expected value of the system's response. The two outcomes displayed on the right vertical axis have a value associated with p(G|E)=1.0− the user indeed having the goal under consideration. The outcomes listed on the left vertical axis indicate the value of the outcomes when p(G|E)=0. The expected value of acting for intermediary probabilities of p(G|E) is a line joining the two deterministic outcomes associated with taking action. The expected value of not acting is a similar line joining the two outcomes associated with inaction.
It is noted that the lines cross at a specific probability of the user having a goal. At this threshold probability, referred to as p*, the expected value of action and inaction are equal. The best decision to make at any value of p(G|E) is the option associated with the greatest expected value at that likelihood of a user having the goal. Inspection of the graph 600 shows that it is better for the user to act if the probability of a goal is greater than p* and to refrain from acting if the probability is less than p*. The threshold probability for any four utilities can be computed by setting the above two equations equal to one another and solving for p(G|E). Given four values associated with the four outcomes of interest, a system need only to check whether the probability of the goal is greater or less than such a threshold probability to decide on whether it is in the best interest of the user to invoke a service.
It is also noted that the threshold probability, p*, can change dynamically as the value associated with one or more of the outcomes may be a function of the context. For example, the utility, u(A, not G), associated with the situation where a system takes action when a goal is not desired, may be greater where more screen real estate is made available. Increased screen real estate can diminish the perceived costs of the needless operation of a scheduling service that may bring up an appointment that obscures items at a user's focus of attention. FIG. 5 displays geometrically how the solution to p* can change when the utility u(A, not G) increases. As demonstrated in the graph 700 of FIG. 5, increasing the value (decreasing the cost) of acting erroneously leads to a lowering of the threshold probability that must be crossed before action occurs.
Beyond reasoning about whether to act or not to assist a user with an autonomous service, whether endowing an option of a system making a decision to ask the users about their goals is also considered. A way to integrate action for dialog into the expected utility framework is to consider the expected value of asking the user a question. Thus, the utility of these additional outcomes are considered: the case where initiate dialog about a goal and the user actually desires the goal under consideration, u(D, G), and the case where the user does not have the goal, u(D, not G). The result is shown in the graph 800 of FIG. 6, which shows the addition of a line representing the expected utility of engaging in a dialog.
As highlighted in the graph 800, the utility of engaging in a dialog with a user when the user does not have the goal in question is generally greater than the utility of performing an action when the goal is not desired. However, the utility of asking a user before performing a desired action is typically smaller than the utility of simply performing a desired action when the user indeed has the goal. In such circumstances, if the rule of selecting the option with the greatest expected utility is follow, then it is seen that action can be guided by two threshold probabilities. The two threshold probabilities are the threshold between inaction and dialog, p*not A, D, and the threshold between dialog and action, p*D, A. These two thresholds provide an instant index into whether to act, to engage the user in a dialog about action, or to do nothing, depending on the assessed likelihood of the user having a goal.
It is noted that explicit computations of expected value do not necessarily need to be performed; rather, thresholds can be directly assessed by designers or users. Such directly assessed thresholds on action imply a deeper assumed expected utility model, as those of ordinary skill within the art can appreciate.
System
In this section of the detailed description, a system according to an embodiment of the invention is described, in conjunction with FIG. 7. The system of FIG. 7 includes an action direction program 902, and a program 904. In one embodiment, one or more of the programs 902 and 904 is a computer program executed by a processor of a computer (such as the computer described in conjunction with FIG. 1) from a computer-readable medium, such as a memory, of the computer. The action direction program 902 has an input 908, for example, from an electronic mail program (not shown in FIG. 7), or another programs (also not shown in FIG. 7). The action direction program 902 provides an action 910 as an output, which is utilized by the program 904.
The input 908 to the action direction program 902 is in one embodiment text, such as the message of an electronic mail as can be provided by an electronic mail program, although the invention is not so limited. Furthermore, the program 904 is a program that is able to perform the action 910. For example, in one embodiment the program 904 is a scheduling program in which a user is able to track appointments within a calendar, such that the action 910 includes a scheduling action that the scheduling program can act upon (e.g., a specific appointment, etc.). In this example, then, the action direction program 902 is a program in which appointments can be gleaned from the input 908 to be made in conjunction with the scheduling program.
The action direction program 902 first determines an action probability based on the input 908. Based thereon, it selects one of the following three options: (1) inaction, (2) automatic action, and (3) suggested action with user approval. If either option (2) is selected, or option (3) is selected and the user has approved the suggested action, then the action direction program 902 performs an action 910 within the program 904. In one embodiment, this determination of an action probability and the option selection based thereon is made by the program 902 in accordance with the methods previously described, although the invention itself is not necessarily so limited.
Conclusion
Although specific embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that any arrangement which is calculated to achieve the same purpose may be substituted for the specific embodiments shown. This application is intended to cover any adaptations or variations of the present invention. Therefore, it is manifestly intended that this invention be limited only by the following claims and equivalents thereof.

Claims (46)

We claim:
1. A computer-implemented method comprising:
determining a text to analyze;
determining an action probability based on at least one of the text and contextual information;
selecting an option selected from the group essentially consisting of: (1) inaction, (2) automatic action, and (3) suggested action with user approval, based on the action probability; and,
upon selecting the option comprising one of the (1) automatic action and the (2) suggested action with user approval, the latter also in conjunction with receiving actual user approval, performing an action based on the text.
2. The method of claim 1, wherein the contextual information comprises information regarding recent user activity.
3. The method of claim 1, wherein the action comprises one of scheduling, forwarding, paging, routing and moving.
4. The method of claim 1, wherein determining a text to analyze comprises determining a message having focus.
5. The method of claim 1, wherein determining an action probability based on the text comprises inputting the text into a text classification system to determine the action probability.
6. The method of claim 5, wherein inputting the text into a text classification system comprises initially generating the text classification system.
7. The method of claim 6, wherein initially generating the text classification system comprises:
performing a feature-selection phase; and,
performing a model-construction phase based on the feature-selection phase.
8. The method of claim 7, wherein performing a feature-selecting phase comprises training the text classification system by inputting a plurality of texts based on which action is to occur and inputting a plurality of texts based on which action is not to occur.
9. The method of claim 7, wherein performing a feature-selection phase comprises seeding the feature-selection phase with domain-specific knowledge.
10. The method of claim 1, wherein selecting an option comprises:
associating a boundary between the (1) and the (2) options with a first probability threshold, and a boundary between the (2) and the (3) options with a second probability threshold;
upon determining that the action probability is less than the first probability threshold, selecting the (1) option;
upon determining that the action probability is greater than the second probability threshold, selecting the (3) option; and,
otherwise, selecting the (2) option.
11. The method of claim 10, wherein associating a boundary between the (1) and the (2) options with a first probability threshold, and a boundary between the (2) and the (3) options with a second probability threshold comprises utilizing decision theory to determine the first and the second probability thresholds.
12. The method of claim 11, wherein utilizing decision theory comprises utilizing cost/benefit analysis.
13. The method of claim 12, wherein utilizing cost/benefit analysis comprises utilizing the cost/benefit analysis in a contextual manner.
14. A machine-readable medium having processor instructions stored thereon for execution by a processor to cause performance of a method comprising:
determining a text to analyze;
determining an action probability based on the text;
selecting an option selected from the group essentially consisting of: (1) inaction, (2) automatic action, and (3) suggested action with user approval, based on the action probability; and,
upon selecting the option comprising one of the (1) automatic action and the (2) suggested action with user approval, the latter also in conjunction with receiving actual user approval, performing an action based on the text.
15. The medium of claim 14, wherein the action comprises one of scheduling, forwarding, paging, routing and moving.
16. The medium of claim 14, wherein determining a text to analyze comprises determining a message having focus.
17. The medium of claim 14, wherein determining an action probability based on the text comprises inputting the text into a text classification system to determine the action probability.
18. The medium of claim 17, wherein inputting the text into a text classification system comprises initially generating the text classification system.
19. The medium of claim 17, wherein initially generating the text classification system comprises:
performing a feature-selection phase; and,
performing a model-construction phase based on the feature-selection phase.
20. The medium of claim 19, wherein performing a feature-selecting phase comprises training the text classification system by inputting a plurality of texts based on which action is to occur and inputting a plurality of texts based on which action is not to occur.
21. The medium of claim 19, wherein performing a feature-selection phase comprises seeding the feature-selection phase with domain-specific knowledge.
22. The medium of claim 14, wherein selecting an option comprises:
associating a boundary between the (1) and the (2) options with a first probability threshold, and a boundary between the (2) and the (3) options with a second probability threshold;
upon determining that the action probability is less than the first probability threshold, selecting the (1) option;
upon determining that the action probability is greater than the second probability threshold, selecting the (3) option; and,
otherwise, selecting the (2) option.
23. The medium of claim 22, wherein associating a boundary between the (1) and the (2) options with a first probability threshold, and a boundary between the (2) and the (3) options with a second probability threshold comprises utilizing decision theory to determine the first and the second probability thresholds.
24. The medium of claim 23, wherein utilizing decision theory comprises utilizing cost/benefit analysis.
25. The medium of claim 24, wherein utilizing cost/benefit analysis comprises utilizing the cost/benefit analysis in a contextual manner.
26. A computerized system comprising:
a program in which a user is able to perform an action; and,
an action direction program to determine an action probability based on an input; select an option selected from the group essentially consisting of: (1) inaction, (2) automatic action, and (3) suggested action with user approval, based on the action probability; and, upon selecting the option comprising one of the (1) automatic action and the (2) suggested action with user approval, the latter also in conjunction with receiving actual user approval, performing an action within the program based on the input.
27. The system of claim 26, wherein the input of the action direction program comprises a user-provided input, such that the action direction program is user-invoked.
28. The system of claim 26, wherein the action program comprises a computer program executed by a processor from a computer-readable medium.
29. The system of claim 26, wherein the action direction program comprises a computer program executed by a processor from a computer-readable medium.
30. The system of claim 26, wherein the action comprises one of scheduling, extraction of contact information, extraction of maps or directions, forwarding, paging, routing and moving.
31. A system that facilitates automated computer action, comprising:
a component that receives information related to intentions of a user; and
an action direction component that analyzes the information and makes a probabilistic determination as to a user desired action to be taken in connection with the received information.
32. The system of claim 31, the information comprising user action data.
33. The system of claim 31, the information comprising user state data.
34. The system of claim 33, the automatic action including at least one of: scheduling an appointment, scoping a calendar to appropriate ranges, forwarding a message, and sending an alert.
35. The system of claim 31, the information comprising sensory related data.
36. The system of claim 31, the action direction component determining that no computer-based action should be performed in connection with the received information.
37. The system of claim 36 further comprising a text classifier.
38. The system of claim 31, the action direction component determining that automatic computer-based action should be performed in connection with the received information.
39. The system of claim 31, the information being text.
40. The system of claim 31, the information being a message.
41. The system of claim 31, further comprising a support vector machine that is employed in connection with determining an action probability relating to the information.
42. The system of claim 31 further comprising a Bayesian network model.
43. The system of claim 31, the probabilistic determination comprising determining an expected utility of taking autonomous action.
44. The system of claim 31, the probabilistic determination comprising determining an expected utility of taking no autonomous action.
45. The system of claim 31, the probabilistic determination comprising determining an expected utility of requesting additional information from the recipient.
46. A system that facilitates automated computer action, comprising:
means for analyzing content related to intentions of a user; and
means for making a probabilistic determination as to a user desired action to be taken in connection with the analyzed content.
US09/295,088 1999-04-20 1999-04-20 Decision-theoretic approach to harnessing text classification for guiding automated action Expired - Lifetime US6553358B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/295,088 US6553358B1 (en) 1999-04-20 1999-04-20 Decision-theoretic approach to harnessing text classification for guiding automated action

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/295,088 US6553358B1 (en) 1999-04-20 1999-04-20 Decision-theoretic approach to harnessing text classification for guiding automated action

Publications (1)

Publication Number Publication Date
US6553358B1 true US6553358B1 (en) 2003-04-22

Family

ID=23136169

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/295,088 Expired - Lifetime US6553358B1 (en) 1999-04-20 1999-04-20 Decision-theoretic approach to harnessing text classification for guiding automated action

Country Status (1)

Country Link
US (1) US6553358B1 (en)

Cited By (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020116466A1 (en) * 2001-02-22 2002-08-22 Parity Communications, Inc Characterizing relationships in social networks
US20030101161A1 (en) * 2001-11-28 2003-05-29 Bruce Ferguson System and method for historical database training of support vector machines
US20040015557A1 (en) * 1999-07-30 2004-01-22 Eric Horvitz Methods for routing items for communications based on a measure of criticality
US20040078750A1 (en) * 2002-08-05 2004-04-22 Metacarta, Inc. Desktop client interaction with a geographical text search system
US20040172457A1 (en) * 1999-07-30 2004-09-02 Eric Horvitz Integration of a computer-based message priority system with mobile electronic devices
US20040267673A1 (en) * 2002-09-13 2004-12-30 Ballard Claudio R. Processing of credit card transactions using internet protocol
US20050058261A1 (en) * 2003-09-15 2005-03-17 Philippe Baumard Method and system for measuring interest levels of digital messages
US20050188037A1 (en) * 2004-01-29 2005-08-25 Yoshitaka Hamaguchi Sensor-driven message management apparatus
US20050204001A1 (en) * 2002-09-30 2005-09-15 Tzvi Stein Method and devices for prioritizing electronic messages
US20050210065A1 (en) * 2004-03-16 2005-09-22 Nigam Kamal P Method for developing a classifier for classifying communications
US20050240568A1 (en) * 2001-08-07 2005-10-27 Banerjee Dwip N Method for collective decision-making
US20050256680A1 (en) * 2004-01-28 2005-11-17 Microsoft Corporation Exponential priors for maximum entropy models
US20060010242A1 (en) * 2004-05-24 2006-01-12 Whitney David C Decoupling determination of SPAM confidence level from message rule actions
US20060287989A1 (en) * 2005-06-16 2006-12-21 Natalie Glance Extracting structured data from weblogs
US20070033188A1 (en) * 2005-08-05 2007-02-08 Ori Levy Method and system for extracting web data
US20070038633A1 (en) * 2005-08-10 2007-02-15 International Business Machines Corporation Method and system for executing procedures in mixed-initiative mode
US20070067197A1 (en) * 2005-09-16 2007-03-22 Sbc Knowledge Ventures, L.P. Efficiently routing customer inquiries created with a self-service application
US20070118391A1 (en) * 2005-10-24 2007-05-24 Capsilon Fsg, Inc. Business Method Using The Automated Processing of Paper and Unstructured Electronic Documents
US20070124432A1 (en) * 2000-10-11 2007-05-31 David Holtzman System and method for scoring electronic messages
US20070143420A1 (en) * 2005-12-19 2007-06-21 William Daniell Methods, systems, and computer program products for sorting electronic-mail messages
US20070150335A1 (en) * 2000-10-11 2007-06-28 Arnett Nicholas D System and method for predicting external events from electronic author activity
US20070271504A1 (en) * 1999-07-30 2007-11-22 Eric Horvitz Method for automatically assigning priorities to documents and messages
WO2007148150A1 (en) * 2006-06-21 2007-12-27 Nokia Corporation Accessing data associated with one application from another application
US20080033899A1 (en) * 1998-05-01 2008-02-07 Stephen Barnhill Feature selection method using support vector machine classifier
US20080147790A1 (en) * 2005-10-24 2008-06-19 Sanjeev Malaney Systems and methods for intelligent paperless document management
US7444380B1 (en) 2004-07-13 2008-10-28 Marc Diamond Method and system for dispensing and verification of permissions for delivery of electronic messages
US7636890B2 (en) 2003-06-26 2009-12-22 Microsoft Corporation User interface for controlling access to computer objects
US7660783B2 (en) 2006-09-27 2010-02-09 Buzzmetrics, Inc. System and method of ad-hoc analysis of data
US20110191693A1 (en) * 2010-02-03 2011-08-04 Arcode Corporation Electronic message systems and methods
US8290768B1 (en) * 2000-06-21 2012-10-16 International Business Machines Corporation System and method for determining a set of attributes based on content of communications
US8347326B2 (en) 2007-12-18 2013-01-01 The Nielsen Company (US) Identifying key media events and modeling causal relationships between key events and reported feelings
US20130007648A1 (en) * 2011-06-28 2013-01-03 Microsoft Corporation Automatic Task Extraction and Calendar Entry
US20130006986A1 (en) * 2011-06-28 2013-01-03 Microsoft Corporation Automatic Classification of Electronic Content Into Projects
US8543519B2 (en) 2000-08-07 2013-09-24 Health Discovery Corporation System and method for remote melanoma screening
EP2642440A1 (en) * 2012-03-21 2013-09-25 Casio Computer Co., Ltd. Reservation management device and computer readable recording medium recording program for reservation management device
US8874727B2 (en) 2010-05-31 2014-10-28 The Nielsen Company (Us), Llc Methods, apparatus, and articles of manufacture to rank users in an online social network
US20150177925A1 (en) * 2013-12-21 2015-06-25 Microsoft Technology Licensing, Llc Authoring through suggestion
US9299039B1 (en) * 2006-08-23 2016-03-29 A9.Com, Inc. Managing task lists utilizing integrated information requests
US20160142344A1 (en) * 2014-11-17 2016-05-19 Citrix Systems, Inc. Automated response action in messaging application
US9519883B2 (en) 2011-06-28 2016-12-13 Microsoft Technology Licensing, Llc Automatic project content suggestion
US9584665B2 (en) 2000-06-21 2017-02-28 International Business Machines Corporation System and method for optimizing timing of responses to customer communications
US9589254B2 (en) 2010-12-08 2017-03-07 Microsoft Technology Licensing, Llc Using e-mail message characteristics for prioritization
US9699129B1 (en) 2000-06-21 2017-07-04 International Business Machines Corporation System and method for increasing email productivity
US20170316022A1 (en) * 2016-04-29 2017-11-02 Microsoft Technology Licensing, Llc Contextually-aware resource manager
WO2018236482A1 (en) * 2017-06-23 2018-12-27 Mastercard International Incorporated Systems and methods for use in facilitating transfers associated with electronic messages
US10361981B2 (en) 2015-05-15 2019-07-23 Microsoft Technology Licensing, Llc Automatic extraction of commitments and requests from communications and content
US10824787B2 (en) * 2013-12-21 2020-11-03 Microsoft Technology Licensing, Llc Authoring through crowdsourcing based suggestions
US10915219B2 (en) 2013-03-20 2021-02-09 Microsoft Technology Licensing, Llc Tracking changes in collaborative authoring environment
US11064044B2 (en) 2016-03-29 2021-07-13 Microsoft Technology Licensing, Llc Intent-based scheduling via digital personal assistant

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5696965A (en) * 1994-11-03 1997-12-09 Intel Corporation Electronic information appraisal agent
US5864848A (en) 1997-01-31 1999-01-26 Microsoft Corporation Goal-driven information interpretation and extraction system
US5870723A (en) * 1994-11-28 1999-02-09 Pare, Jr.; David Ferrin Tokenless biometric transaction authorization method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5696965A (en) * 1994-11-03 1997-12-09 Intel Corporation Electronic information appraisal agent
US6151600A (en) * 1994-11-03 2000-11-21 Intel Corporation Electronic information appraisal agent
US5870723A (en) * 1994-11-28 1999-02-09 Pare, Jr.; David Ferrin Tokenless biometric transaction authorization method and system
US5864848A (en) 1997-01-31 1999-01-26 Microsoft Corporation Goal-driven information interpretation and extraction system

Non-Patent Citations (13)

* Cited by examiner, † Cited by third party
Title
"Principles of Mixed-Initiative User Interfaces"; Eric Horvitz; Microsoft Research; Aug. 27, 2000.
Ben Shneiderman, Pattie Maes, Direct Manipulation vs Interface Agents: Excerpts from debates at IUI 97 and CHI 97, interactions, Nov.-Dec. 1997, pp. 42-61.
Daivd Heckerman and Eric Horvitz, Inferring Informational Goals from Free-Text Queries: A Bayesian Approach, Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence, Madison, WI, Jul. 1998, Morgan Kaufmann Publishers, pp. 230-237.
Eric Horvitz, Jack Breese, David Heckerman, David Hovel, Koos Rommelse, The Lumiere Project: Bayesian User Modeling for Inferring the Goals and Needs of Software Users, Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence, Madison, WI, Jul. 1998, Morgan Kaufmann Publishers, pp. 256-265.
Eric Horvitz, Matthew Barry, Display of Information for Time-Critical Decision-Making, Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence, Montreal, Aug. 1995.
Judea Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference (ISBN 1558604790), Apr. 1997.
M. Sahami, S. Dumais, D. Heckerman, E. Horvitz, A Bayesian Approach to Filtering Junk E-mail, AAAI Workshop on Text Classification, Jul. 1998, Madison, Wisconsin, AAAI Technical Report WS-98-05.
Susan Dumais, John Platt, David Heckerman, Mehran Sahami, Inductive Learning Algorithms and Representations for Text Categorization, Proceedings of ACM-CIKM98, Nov. 1998.
U.S. patent application Ser. No. 08/684,003, filed Jul. 19, 1996.
U.S. patent application Ser. No. 09/055,477, filed Apr. 6, 1998.
U.S. patent application Ser. No. 09/197,158, filed Nov. 20, 1998.
U.S. patent application Ser. No. 09/197,159, filed Nov. 20, 1998.
U.S. patent application Ser. No. 09/197,160, filed Nov. 20, 1998.

Cited By (105)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8275723B2 (en) 1998-05-01 2012-09-25 Health Discovery Corporation System for providing data analysis services using a support vector machine for processing data received from a remote source
US7542959B2 (en) 1998-05-01 2009-06-02 Health Discovery Corporation Feature selection method using support vector machine classifier
US20080033899A1 (en) * 1998-05-01 2008-02-07 Stephen Barnhill Feature selection method using support vector machine classifier
US20100256988A1 (en) * 1998-05-01 2010-10-07 Health Discovery Corporation System for providing data analysis services using a support vector machine for processing data received from a remote source
US7233954B2 (en) 1999-07-30 2007-06-19 Microsoft Corporation Methods for routing items for communications based on a measure of criticality
US20040015557A1 (en) * 1999-07-30 2004-01-22 Eric Horvitz Methods for routing items for communications based on a measure of criticality
US7444384B2 (en) 1999-07-30 2008-10-28 Microsoft Corporation Integration of a computer-based message priority system with mobile electronic devices
US7337181B2 (en) 1999-07-30 2008-02-26 Microsoft Corporation Methods for routing items for communications based on a measure of criticality
US20070271504A1 (en) * 1999-07-30 2007-11-22 Eric Horvitz Method for automatically assigning priorities to documents and messages
US7464093B2 (en) 1999-07-30 2008-12-09 Microsoft Corporation Methods for routing items for communications based on a measure of criticality
US20040172483A1 (en) * 1999-07-30 2004-09-02 Eric Horvitz Methods for routing items for communications based on a measure of criticality
US20090119385A1 (en) * 1999-07-30 2009-05-07 Microsoft Corporation Integration of a computer-based message priority system with mobile electronic devices
US20060041583A1 (en) * 1999-07-30 2006-02-23 Microsoft Corporation Methods for routing items for communications based on a measure of criticality
US20050251560A1 (en) * 1999-07-30 2005-11-10 Microsoft Corporation Methods for routing items for communications based on a measure of criticality
US8892674B2 (en) 1999-07-30 2014-11-18 Microsoft Corporation Integration of a computer-based message priority system with mobile electronic devices
US8166392B2 (en) 1999-07-30 2012-04-24 Microsoft Corporation Method for automatically assigning priorities to documents and messages
US20040172457A1 (en) * 1999-07-30 2004-09-02 Eric Horvitz Integration of a computer-based message priority system with mobile electronic devices
US9584665B2 (en) 2000-06-21 2017-02-28 International Business Machines Corporation System and method for optimizing timing of responses to customer communications
US9699129B1 (en) 2000-06-21 2017-07-04 International Business Machines Corporation System and method for increasing email productivity
US8290768B1 (en) * 2000-06-21 2012-10-16 International Business Machines Corporation System and method for determining a set of attributes based on content of communications
US8543519B2 (en) 2000-08-07 2013-09-24 Health Discovery Corporation System and method for remote melanoma screening
US20070150335A1 (en) * 2000-10-11 2007-06-28 Arnett Nicholas D System and method for predicting external events from electronic author activity
US7844483B2 (en) 2000-10-11 2010-11-30 Buzzmetrics, Ltd. System and method for predicting external events from electronic author activity
US7844484B2 (en) 2000-10-11 2010-11-30 Buzzmetrics, Ltd. System and method for benchmarking electronic message activity
US20070124432A1 (en) * 2000-10-11 2007-05-31 David Holtzman System and method for scoring electronic messages
US7600017B2 (en) 2000-10-11 2009-10-06 Buzzmetrics, Ltd. System and method for scoring electronic messages
US20110161270A1 (en) * 2000-10-11 2011-06-30 Arnett Nicholas D System and method for analyzing electronic message activity
US7366759B2 (en) * 2001-02-22 2008-04-29 Parity Communications, Inc. Method and system for characterizing relationships in social networks
US20020116466A1 (en) * 2001-02-22 2002-08-22 Parity Communications, Inc Characterizing relationships in social networks
US6980983B2 (en) * 2001-08-07 2005-12-27 International Business Machines Corporation Method for collective decision-making
US20050240568A1 (en) * 2001-08-07 2005-10-27 Banerjee Dwip N Method for collective decision-making
US6944616B2 (en) * 2001-11-28 2005-09-13 Pavilion Technologies, Inc. System and method for historical database training of support vector machines
US20030101161A1 (en) * 2001-11-28 2003-05-29 Bruce Ferguson System and method for historical database training of support vector machines
US20040078750A1 (en) * 2002-08-05 2004-04-22 Metacarta, Inc. Desktop client interaction with a geographical text search system
US7599988B2 (en) * 2002-08-05 2009-10-06 Metacarta, Inc. Desktop client interaction with a geographical text search system
US20040267673A1 (en) * 2002-09-13 2004-12-30 Ballard Claudio R. Processing of credit card transactions using internet protocol
US20110082792A1 (en) * 2002-09-13 2011-04-07 Data Treasury Corporation Processing of Credit Card Transactions Using Internet Protocol
US20050204001A1 (en) * 2002-09-30 2005-09-15 Tzvi Stein Method and devices for prioritizing electronic messages
US7636890B2 (en) 2003-06-26 2009-12-22 Microsoft Corporation User interface for controlling access to computer objects
US20050058261A1 (en) * 2003-09-15 2005-03-17 Philippe Baumard Method and system for measuring interest levels of digital messages
US20070286072A1 (en) * 2003-09-15 2007-12-13 Philippe Baumard Method and system for measuring interest levels of digital messages
US7251640B2 (en) * 2003-09-15 2007-07-31 Philippe Baumard Method and system for measuring interest levels of digital messages
US7711667B2 (en) 2003-09-15 2010-05-04 Philippe Baumard Method and system for measuring interest levels of digital messages
US7219035B2 (en) 2004-01-28 2007-05-15 Microsoft Corporation Exponential priors for maximum entropy models
US7483813B2 (en) 2004-01-28 2009-01-27 Microsoft Corporation Exponential priors for maximum entropy models
US20050256685A1 (en) * 2004-01-28 2005-11-17 Microsoft Corporation Exponential priors for maximum entropy models
US7340376B2 (en) 2004-01-28 2008-03-04 Microsoft Corporation Exponential priors for maximum entropy models
US20050256680A1 (en) * 2004-01-28 2005-11-17 Microsoft Corporation Exponential priors for maximum entropy models
US20070043556A1 (en) * 2004-01-28 2007-02-22 Microsoft Corporation Exponential priors for maximum entropy models
US7184929B2 (en) 2004-01-28 2007-02-27 Microsoft Corporation Exponential priors for maximum entropy models
US20050188037A1 (en) * 2004-01-29 2005-08-25 Yoshitaka Hamaguchi Sensor-driven message management apparatus
US7725414B2 (en) * 2004-03-16 2010-05-25 Buzzmetrics, Ltd An Israel Corporation Method for developing a classifier for classifying communications
US20050210065A1 (en) * 2004-03-16 2005-09-22 Nigam Kamal P Method for developing a classifier for classifying communications
US20060010212A1 (en) * 2004-05-24 2006-01-12 Whitney David C Storing message rules in global form for transfer between servers
US20060010242A1 (en) * 2004-05-24 2006-01-12 Whitney David C Decoupling determination of SPAM confidence level from message rule actions
US20060031311A1 (en) * 2004-05-24 2006-02-09 Whitney David C Extended message rule architecture
US7827244B2 (en) 2004-05-24 2010-11-02 Microsoft Corporation Storing message rules in global form for transfer between servers
US7818377B2 (en) 2004-05-24 2010-10-19 Microsoft Corporation Extended message rule architecture
US7444380B1 (en) 2004-07-13 2008-10-28 Marc Diamond Method and system for dispensing and verification of permissions for delivery of electronic messages
US11556598B2 (en) 2005-06-16 2023-01-17 Buzzmetrics, Ltd. Extracting structured data from weblogs
US9158855B2 (en) 2005-06-16 2015-10-13 Buzzmetrics, Ltd Extracting structured data from weblogs
US10180986B2 (en) 2005-06-16 2019-01-15 Buzzmetrics, Ltd. Extracting structured data from weblogs
US20060287989A1 (en) * 2005-06-16 2006-12-21 Natalie Glance Extracting structured data from weblogs
US7596552B2 (en) 2005-08-05 2009-09-29 Buzzmetrics Ltd. Method and system for extracting web data
US20070033188A1 (en) * 2005-08-05 2007-02-08 Ori Levy Method and system for extracting web data
US20070038633A1 (en) * 2005-08-10 2007-02-15 International Business Machines Corporation Method and system for executing procedures in mixed-initiative mode
US20070067197A1 (en) * 2005-09-16 2007-03-22 Sbc Knowledge Ventures, L.P. Efficiently routing customer inquiries created with a self-service application
US8176004B2 (en) 2005-10-24 2012-05-08 Capsilon Corporation Systems and methods for intelligent paperless document management
US20070118391A1 (en) * 2005-10-24 2007-05-24 Capsilon Fsg, Inc. Business Method Using The Automated Processing of Paper and Unstructured Electronic Documents
US20080147790A1 (en) * 2005-10-24 2008-06-19 Sanjeev Malaney Systems and methods for intelligent paperless document management
US7747495B2 (en) 2005-10-24 2010-06-29 Capsilon Corporation Business method using the automated processing of paper and unstructured electronic documents
US20070143420A1 (en) * 2005-12-19 2007-06-21 William Daniell Methods, systems, and computer program products for sorting electronic-mail messages
US7546535B2 (en) * 2005-12-19 2009-06-09 At&T Intellectual Property, I, L.P. Methods, systems, and computer program products for sorting electronic-mail messages
WO2007148150A1 (en) * 2006-06-21 2007-12-27 Nokia Corporation Accessing data associated with one application from another application
US20100017367A1 (en) * 2006-06-21 2010-01-21 Mikko Nurmi Accessing Data Associated with One Application from Another Application
US9299039B1 (en) * 2006-08-23 2016-03-29 A9.Com, Inc. Managing task lists utilizing integrated information requests
US7660783B2 (en) 2006-09-27 2010-02-09 Buzzmetrics, Inc. System and method of ad-hoc analysis of data
US8793715B1 (en) 2007-12-18 2014-07-29 The Nielsen Company (Us), Llc Identifying key media events and modeling causal relationships between key events and reported feelings
US8347326B2 (en) 2007-12-18 2013-01-01 The Nielsen Company (US) Identifying key media events and modeling causal relationships between key events and reported feelings
US20110191693A1 (en) * 2010-02-03 2011-08-04 Arcode Corporation Electronic message systems and methods
US9600806B2 (en) 2010-02-03 2017-03-21 Arcode Corporation Electronic message systems and methods
US8874727B2 (en) 2010-05-31 2014-10-28 The Nielsen Company (Us), Llc Methods, apparatus, and articles of manufacture to rank users in an online social network
US9455891B2 (en) 2010-05-31 2016-09-27 The Nielsen Company (Us), Llc Methods, apparatus, and articles of manufacture to determine a network efficacy
US9589254B2 (en) 2010-12-08 2017-03-07 Microsoft Technology Licensing, Llc Using e-mail message characteristics for prioritization
US10021055B2 (en) 2010-12-08 2018-07-10 Microsoft Technology Licensing, Llc Using e-mail message characteristics for prioritization
US9519883B2 (en) 2011-06-28 2016-12-13 Microsoft Technology Licensing, Llc Automatic project content suggestion
US20130007648A1 (en) * 2011-06-28 2013-01-03 Microsoft Corporation Automatic Task Extraction and Calendar Entry
US20130006986A1 (en) * 2011-06-28 2013-01-03 Microsoft Corporation Automatic Classification of Electronic Content Into Projects
US11328259B2 (en) * 2011-06-28 2022-05-10 Microsoft Technology Licensing, Llc Automatic task extraction and calendar entry
US10984387B2 (en) * 2011-06-28 2021-04-20 Microsoft Technology Licensing, Llc Automatic task extraction and calendar entry
EP2642440A1 (en) * 2012-03-21 2013-09-25 Casio Computer Co., Ltd. Reservation management device and computer readable recording medium recording program for reservation management device
US10915219B2 (en) 2013-03-20 2021-02-09 Microsoft Technology Licensing, Llc Tracking changes in collaborative authoring environment
US20150177925A1 (en) * 2013-12-21 2015-06-25 Microsoft Technology Licensing, Llc Authoring through suggestion
US11514399B2 (en) * 2013-12-21 2022-11-29 Microsoft Technology Licensing, Llc Authoring through suggestion
US10824787B2 (en) * 2013-12-21 2020-11-03 Microsoft Technology Licensing, Llc Authoring through crowdsourcing based suggestions
WO2016081469A1 (en) * 2014-11-17 2016-05-26 Citrix Systems, Inc. Automated response action in messaging application
US20160142344A1 (en) * 2014-11-17 2016-05-19 Citrix Systems, Inc. Automated response action in messaging application
US10361981B2 (en) 2015-05-15 2019-07-23 Microsoft Technology Licensing, Llc Automatic extraction of commitments and requests from communications and content
US11064044B2 (en) 2016-03-29 2021-07-13 Microsoft Technology Licensing, Llc Intent-based scheduling via digital personal assistant
US11089132B2 (en) 2016-03-29 2021-08-10 Microsoft Technology Licensing, Llc Extensibility for context-aware digital personal assistant
US11178248B2 (en) * 2016-03-29 2021-11-16 Microsoft Technology Licensing, Llc Intent-based calendar updating via digital personal assistant
US20220046106A1 (en) * 2016-03-29 2022-02-10 Microsoft Technology Licensing, Llc Intent-based calendar updating via digital personal assistant
US11570275B2 (en) * 2016-03-29 2023-01-31 Microsoft Technology Licensing, Llc Intent-based calendar updating via digital personal assistant
US20170316022A1 (en) * 2016-04-29 2017-11-02 Microsoft Technology Licensing, Llc Contextually-aware resource manager
WO2018236482A1 (en) * 2017-06-23 2018-12-27 Mastercard International Incorporated Systems and methods for use in facilitating transfers associated with electronic messages

Similar Documents

Publication Publication Date Title
US6553358B1 (en) Decision-theoretic approach to harnessing text classification for guiding automated action
US6505167B1 (en) Systems and methods for directing automated services for messaging and scheduling
US7120865B1 (en) Methods for display, notification, and interaction with prioritized messages
US20020049602A1 (en) Waiting prior to engaging in action for enhancement of automated service
US6622160B1 (en) Methods for routing items for communications based on a measure of criticality
US7444384B2 (en) Integration of a computer-based message priority system with mobile electronic devices
EP1203307B1 (en) Architecture for managing alerts
EP1384163B1 (en) Method and system for prioritized alerts
EP1287444B1 (en) Priorities generation and management
US7499896B2 (en) Systems and methods for estimating and integrating measures of human cognitive load into the behavior of computational applications and services
Horvitz et al. Attention-sensitive alerting
US8166392B2 (en) Method for automatically assigning priorities to documents and messages
US7739210B2 (en) Methods and architecture for cross-device activity monitoring, reasoning, and visualization for providing status and forecasts of a users' presence and availability
US8024415B2 (en) Priorities generation and management
EP1515502B1 (en) Method and system for measuring interest levels of digital messages
US6581050B1 (en) Learning by observing a user's activity for enhancing the provision of automated services
US20050138552A1 (en) Clustering messages
US6657643B1 (en) Modulating the behavior of an animated character to reflect beliefs inferred about a user's desire for automated services
EP1852789A1 (en) Priorities generation and management
US6708201B1 (en) Goal-directed asynchronous messaging system
Ayodele et al. Machine learning email prediction system (MLEPS)
Mohd Nasiruddin E-mail Filtering System for Nigerian Spam
Ayodele et al. Intelligent email prediction system (IEPS)
Mo A Referral-Based Recommender System for E-commerce

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT CORP., WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HORVITZ, ERIC;REEL/FRAME:010134/0359

Effective date: 19990714

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034541/0001

Effective date: 20141014